Meeting the Cybersecurity Standards of ANSI/ISA 62443 with...

22
Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes Dennis Lanahan June 1, 2015 Securing the convergence of OT and IT with ST 1

Transcript of Meeting the Cybersecurity Standards of ANSI/ISA 62443 with...

Page 1: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes

Dennis Lanahan June 1, 2015

Securing the convergence of OT and IT with ST 1

Page 2: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Introduction to Owl

2

• Started 16 years ago with data diode technology from US DOE Sandia National Laboratory – Patented and Proprietary DualDiode technology

– Hardware enforced, network protocol break, One way link (Owl)

• Over 2000 deployments globally

• Serve US DoD & Co-Commands, US Intelligence agencies, DISA, DOE, DHS, DOS and many other US Gov. agencies – Accredited solutions for unclassified, secret, top secret and coalition partner networks

• Supporting Critical Infrastructure for 9 years – Protecting over 200 process control sites in critical infrastructure

– Oil & Gas, Nuclear, Fossil, and Hydro power generation, T&D, petrochemical, water/wastewater, mining

• Rockwell Encompass Partner since 2013

US Owned & Operated Product Suite 1200+ Security

Solutions Deployed US Owned and Operated Suite of cybersecurity products 2000+ Security Solutions

Deployed

Page 3: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Introduction to Owl

3

• Started 16 years ago with data diode technology from US DOE Sandia National Laboratory – Patented and Proprietary DualDiode technology

– Hardware enforced, network protocol break, One way link (Owl)

• Over 2000 deployments globally

• Serve US DoD & Co-Commands, US Intelligence agencies, DISA, DOE, DHS, DOS and many other US Gov. agencies – Accredited solutions for unclassified, secret, top secret and coalition partner networks

• Supporting Critical Infrastructure for 9 years – Protecting over 200 process control sites in critical infrastructure

– Oil & Gas, Nuclear, Fossil, and Hydro power generation, T&D, petrochemical, water/wastewater, mining

• Rockwell Encompass Partner since 2013

US Owned & Operated Product Suite 1200+ Security

Solutions Deployed Suite of cybersecurity products 2000+ Security Solutions

Deployed

Page 4: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Enabling the Connected Enterprise

4

• Owl DualDiode is Security Technology (ST)

• Designed and Deployed at the intersection of OT and IT

• Hardware Enforced Security Policy – cannot change

• Ethernet connectivity for ease of implementation in networks

• Rack-mounted & DIN Rail appliance utilize DualDiode technology

Securing the convergence of OT and IT with ST

Page 5: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Why we need Cybersecurity

5 * Common Criteria Part 1: Introduction and general model, 2005, v2.3

Page 6: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Cybersecurity Standards

– ANSI/ISA-62443

– NERC CIP 002-009

– NIST SP800-82

– API Standard 1164

– ChemITC

– AWWA G430-09

• Owl has mapped solutions to the various standards

• Same implementation process applies

6

Page 7: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Definitions (ANSI/ISA 62443)

• Security Zone: – A logical grouping of physical, informational and

application assets sharing common security requirements.

• Conduit: – Communication flows that represent information

exchanges between security zones.

• Defining Security Zones: – In building a security program, zones are one of the most

important tools for program success and proper definition of the zones is the most important aspect of the process.

7

Page 8: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

How to Approach a Standards Based Security Implementation

8

1) Define the network security zones 2) Define work, workflows and data needed within and between zones 3) Define security policies for network zones 4) Define security solutions that enable and enforce requirements

OT Network (plant)

Corporate Network

Page 9: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

FactoryTalk® Gateway FactoryTalk®

Historian

End Users

Corporate IT Network

• EXCELLENT BUSINESS CONTINUITY

• LIMITED CYBER SECURITY

Firewall

Typical Industrial Network

End Users

OT Network

Firewall

DMZ

9

RSLinx® Classic

Intersection of IT and OT

Page 10: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Air gap network security

• EXCELLENT CYBER SECURITY

• LIMITED, OR NO, BUSINESS CONTINUITY

End Users

Firewall

End Users Firewall

Air gap

10

FactoryTalk® Gateway FactoryTalk®

Historian

RSLinx® Classic

Corporate IT Network OT Network

Page 11: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

The Connected Enterprise requires both

EXCELLENT BUSINESS CONTINUTIY

AND

EXCELLENT CYBER SECURITY

11

How do you Achieve this?

Page 12: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Key Decisions to Remedy Business Challenges

End User

Plant OT Network

Corporate IT Network

1. Define security zones

High Security Zone Prevent outside access

Business Security Zone Enable plant support operations

End User

Firewall

DMZ

Firewall

12

FactoryTalk® Gateway FactoryTalk®

Historian

RSLinx® Classic

Page 13: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Key Decisions to Remedy Business Challenges

End User

1. Define security zones 2. Define work zones, workflows and data transfers within the zones

Business Security Zone Enable plant support operations

High Security Zone Prevent outside access

End User

FactoryTalk® Historian

Firewall

Firewall

13

FactoryTalk® Gateway FactoryTalk®

Historian

RSLinx® Classic

Plant OT Network

Corporate IT Network

Page 14: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Key Decisions to Remedy Business Challenges

End User

1. Define security zones 2. Define workflows and data transfers within the zones 3. Define security policy – data transfers out, no attack vectors in

Business Security Zone Enable plant support operations

High Security Zone Prevent outside access

End User

Firewall

Firewall

14

FactoryTalk® Historian

FactoryTalk® Gateway FactoryTalk®

Historian

RSLinx® Classic

Plant OT Network

Corporate IT Network

Page 15: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Key Decisions to Remedy Business Challenges

End User

End User

1. Define security zones 2. Define workflows and data transfers within the zones 3. Define security policy – data transfers out, no attack vectors in 4. Define security solution to support all requirements

Business Security Zone Enable plant support operations

High Security Zone Prevent outside access

Owl Data Diode

Firewall

Firewall

15

FactoryTalk® Historian

FactoryTalk® Gateway FactoryTalk®

Historian

RSLinx® Classic

Plant OT Network

Corporate IT Network

Convergence of IT and OT

protected by ST

Page 16: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Product Suite 1200+ Security

Solutions Deployed

Features = Benefits

Well defined security zones and policies = Security standards met

Separation of network domains = Improved cyber security

OT Network secured = Increased Plant Reliability

OT data flows to IT = End users in IT domain have data so they can work

Business continuity = Improved business operations

Owl’s Security Technology = Enables the Convergence of OT and IT

16

Page 17: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Data Diode Hardware Security Policy

• Hardware enforced one-way only data transfer • One-way data flow out of secure network zone • No external access into the secure network zone • No bidirectional TCP/IP connection • Software attack can not modify hardware security policy

• Network Confidentiality • Network protocol break = Asynchronous Transmission Mode (ATM) • Source Network IP data -> ATM -> Destination Network IP data • Only the “payload” of IP data packets cross the DualDiode • Data Diode remains “invisible” on the network • Data Diode has no IP or MAC address • Protects all IP and MAC addresses of the source network devices • No external network scanning or mapping of secure network 17

Page 18: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

18

OT Network

IT Network

DualDiode Operational Architecture

• DualDiode hardware enforced security solution • Two diodes, in series, enforce “air gap” network separation • One-way hardware constrained by single fiber optic cable

Source Destination

Ethernet

Ethernet

• Diode server terminates each network endpoint • Hardened Linux OS further secures each server • Servers only support specific & whitelisted data transfer applications

Air Gap

Server Server

DualDiode Technology

Page 19: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Data Transfer Applications

• Owl Supports Rockwell Applications • RSLinx® Classic

• FactoryTalk® Gateway

• FactoryTalk® Historian

• Owl Supports other Transfer Applications • Historian replication • SQL Database replication • Syslog transfer • Email Alerts and events • Remote HMI Screen replication • UDP, multicast, broadcast, unicast (video surveillance) • TCP/IP transfers • Remote File Transfer for Reporting, Alarms, Events, any file • OPC Foundation certified, supporting DA, A&E, UA • Modbus • Others…

19

Page 20: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Product Suite 1200+ Security

Solutions Deployed

Enterprise Wide Deployment Locations

20

Page 21: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

Summary

Owl Secures the convergence of OT and IT with ST

21

1. Pick a cybersecurity standard

2. Define your network security zones

3. Define work, workflows and data transfers needed

4. Define network security policies

5. Define security solution to support all requirements

Page 22: Meeting the Cybersecurity Standards of ANSI/ISA 62443 with ...owlcyberdefense.com/wp-content/uploads/2019/05/owlcyberdefense... · Meeting the Cybersecurity Standards of ANSI/ISA

22